刷题
导入试题
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AC
解析
暂无解析
相关试题
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
推荐试题
【单选题】
下列哪些选项不是属于专用结算凭证___。
A. 现金支票
B. 结算申请书
C. 现金缴款单
D. 通知存款提款通知书
【单选题】
以下哪个账户不支持出售凭证___。
A. 财政存款账户
B. 同业活期存款账户
C. 集中支付账户
D. 保证金账户
【单选题】
对于“2601凭证出售”业务,系统控制一次最多添加___条凭证记录。
A. 二
B. 三
C. 四
D. 五
【单选题】
开立一般存款账户应在其开立后___,由客户经理或指定人员实地走访客户,切实履行“客户尽职调查”义务。
A. 3天
B. 一个星期
C. 一个月
D. 6个月
【单选题】
开立基本存款账户应在___,由客户经理或指定人员实地走访客户,切实履行“客户尽职调查”义务。
A. 开户前
B. 开户后一个星期内
C. 开户后一个月内
D. 开户后6个月内
【单选题】
判定公司受益所有人的基本标准是直接或者间接拥有超过___公司股权或者表决权的自然人。
A. 20%
B. 25%
C. 50%
D. 51%
【单选题】
客户身份识别,应遵循___原则。
A. 尊重客户
B. 了解你的客户
C. 客户至上
D. 客户第一
【单选题】
在为客户提供单笔人民币___万元(含)或外币等值( )美元(含)以上一次性金融服务时,应识别客户身份。
A. 1,1000
B. 1,2000
C. 2,2000
D. 2,1000
【单选题】
营业机构为自然人客户办理___现金存取的,应当识别客户身份。核查客户本人、代理人的居民身份证件,完整登记客户本人、代理人的身份基本信息。
A. 人民币单笔5万元(含)以上或者外币等值1万美元(不含)以上
B. 人民币单笔5万元(含)以上或者外币等值5千美元(不含)以上
C. 人民币单笔5万元(含)以上或者外币等值1万美元(含)以上
D. 人民币单笔5万元(含)以上或者外币等值5千美元(含)以上
【单选题】
初次开户,建立客户信息后,各级机构应在建立业务关系的___个工作日内在我行反洗钱监测系统中对客户进行风险等级评定。
A. 10
B. 5
C. 3
D. 15
【单选题】
根据客户风险情况要素变化,___对高(较高)风险的客户等级进行再评。
A. 每一季度内
B. 每半年内
C. 每年内
D. 视情况看
【单选题】
客户风险等级分类管理的范围为我行开户的所有___客户
A. 个人
B. 单位
C. 单位及个人
【单选题】
在同等条件下,来自于反洗钱、反恐怖融资监管薄弱的国家(地区)客户的风险等级应___来自于其他国家(地区)的客户。
A. 高于
B. 等于
C. 小于
【单选题】
应当对涉恐名单开展实时监测,有合理理由怀疑与监控名单相关的,应当立即提交可疑交易报告,最迟不超过业务发生后的___小时
A. 12
B. 24
C. 48
D. 72
【单选题】
主办会计在反洗钱信息监控中担任什么角色___。
A. 编辑岗
B. 审核岗
C. 审批岗
D. 复核岗
【单选题】
总行运营管理部设置上报___,主要用于反洗钱系统中的数据包报送管理等,在业务发生后的10个工作日内,登录反洗钱监控系统,进行组包发送等处理。(操作指引无相关内容)
A. 编辑岗
B. 审核岗
C. 审批岗
D. 管理岗
【单选题】
大额交易报告在交易发生之日起的___个工作日内以电子方式提交。 可疑交易报告在按我行可疑交易操作规程确认为可疑交易后,及时以电子方式提交可疑交易报告。
A. 5
B. 15
C. 20
D. 25
【单选题】
按照完整准确、安全保密的原则,将大额交易和可疑交易报告、反映可疑交易分析及内部处理情况的工作记录等信息资料自生成之日起至少保存___年。
A. 1
B. 2
C. 3
D. 5
【单选题】
总行运营管理部报送管理岗每天登录反洗钱系统,对大额交易报告或可疑交易报告进行组包、报送。大额交易报告或可疑交易报告内容要素不全或存在错误的,在接到补正通知之日起___个工作内补正,并对大额可疑交易报告再组包,报送。
A. 2
B. 3
C. 4
D. 5
【单选题】
可疑交易报告的履职要求中规定:可疑特征未发生显著变化的,应当自上一次提交可疑交易报告之日起每___个月提交一次接续报告。
A. 1
B. 2.
C. 3
D. 4
【单选题】
恐怖活动组织及恐怖活动人员名单调整的,反洗钱义务机构应当立即针对本机构的存量客户以及上溯___内的交易开展回溯性调查,并按规定提交可疑交易报告。
A. 1年
B. 2年
C. 3年
D. 5年
【单选题】
居住在中国境内___周岁以上的中国公民,在我行可独立开立个人银行账户。
A. 16
B. 18
C. 20
D. 以上都不对
【单选题】
我行以_________的形式对客户信息进行管理。___
A. 、身份证号
B. 卡号
C. 账号
D. 客户号
【单选题】
金融机构在与客户建立业务关系时,首先应进行___
A. 客户身份识别
B. 大额和可疑交易报告
C. 可疑交易的分析
D. 与司法机关全面合作
【单选题】
下列哪项不是“1701个人信息建立”的必输项___
A. 性别
B. 国籍
C. 邮政编码
D. 住所地/单位地址
【单选题】
建立个人客户信息,柜员点击“公共业务”—“客户信息”—“___个人客户信息建立”进入录入界面。
A. 1701
B. 1702
C. 1703
D. 1704
【单选题】
若本人未满___周岁,须由监护人代为办理,需提供监护人的身份证,本人身份证或户口簿,以及证明监护人关系的户口簿。如果户口簿无法证明监护人关系,需额外提供能证明监护人关系的证明(如公证证明、派出所的子女关系证明、法院判决、出生证明等)。
A. 15
B. 16
C. 17
D. 18
【单选题】
外国公民来我行开户时应出具___外国边民,按照边贸结算的有关规定办理)。
A. 护照或外国人永久居留证
B. 护照或其他有效旅行证件
C. 护照或村民居委会证明
D. 护照或往来大陆通行证
【单选题】
香港、澳门特别行政区居民应凭___建立个人客户信息。
A. 护照
B. 港澳居民往来内地通行证
C. 中国护照
D. 台湾居民往来往大陆通行证
【单选题】
客户申请客户信息维护需凭有效身份证件办理,对于证件或证件号码变更的,还应提供___
A. 发证机关等有权机关出具的相关证明文件
B. 户籍所在地公安机关的设分变更证明
C. 村委会出具的证明
D. 公安机关出具的证明
【单选题】
为不在本机构开立账户的客户提供现金汇款、现金方式解付应解汇款、银行汇票、银行本票对付等一次性金融服务且交易金额单笔人民币1万元(含)以上或等值___美元(含)以上的应出示身份证件,进行联网核查(非居民身份证的,视角核对),并留存身份证件复印件或影印件的业务。
A. 1000
B. 2000
C. 5000
D. 10000
【单选题】
以下哪一项不属于出示身份证件,进行联网核查(非居民身份证的,视角核对),并留存身份证件复印件或影印件的业务___
A. 开立个人结算账户,开立客户号
B. 变更存款人证件类型、证件号码
C. 购买现金支票、转账支票等重要空白凭证的
D. 为不在本机构开立账户的客户提供银行本票对付等一次性金融服务且交易金额单笔人民币1万元(含)以上或等值5000美元(含)以上的
【单选题】
自助柜员机吞没卡领卡需要___。
A. 出示身份证件,进行联网核查,并留存身份证件复印件或影印件的业务。
B. 出示身份证件,进行联网核查,交易中录入身份证号码。
C. 出示身份证件,身份识别仪鉴别(非居民身份证的,视角核对),并摘录身份证件号码。
【单选题】
本人及代理人客户办理人民币单笔___元(含)以上或外币等值()美元(含)以上现金存取款业务时,需要出示身份证件。
A. 5万 5千
B. 5万 1万
C. 10万 5千
D. 10万 1万
【单选题】
当办理个人业务无法确切判断客户出示的居民身份证为虚假证件时,应当___。
A. 拒绝为该客户办理相关业务
B. 挂失业务须进一步核实个人居民身份证的真伪后再决定是否办理
C. 当确认该身份证件属虚假证件,应及时通知该客户撤销账户,并将有关情况报告人民银行当地分支机构及总行相关部门
D. 客户提供其他能证明其身份的有效证件后继续为客户办理业务
【单选题】
下列哪些业务需要出示身份证件,进行联网核查(非居民身份证的,视角核对),并留存身份证件复印件或影印件的业务?___
A. 办理定期储蓄账户提前支取
B. 水、电、气、煤等公共事业的代缴代扣关系建立及撤销
C. 自助柜员机吞没卡领卡
D. 对于代理现金存款业务,如果代理人因合理理由无法提供被代理人有效身份证件且单笔存款金额达到或超过人民币1万元或外币等值1000美元时
【单选题】
目前我行身份识别方式有几种?___
A. 3
B. 4
C. 5
D. 6
【单选题】
临柜人员发现客户以虚假居民身份证骗取开立银行账户或办理其他银行业务的,应向___报告,并及时向公安机关报案。
A. 会计部
B. 人保部
C. 运营部
D. 科技部
【单选题】
身份审核是通过公安部和___系统平台建立的联网核查公民身份信息系统及身份识别仪核对或查询相关个人的公民身份信息,以验证相关个人的居民身份证所记载的姓名、身份证件号码、照片及签发机关等信息真实的行为。
A. 银行监督管理局
B. 各级人民政府
C. 人民银行
D. 银行机构
【单选题】
以下需出示身份证件,身份识别仪鉴别(非居民身份证的,视角核对),并摘录身份证件号码的业务是? ___
A. 为银行汇票、本票、应解汇款解付转入本人账户的;以现金方式解付应解汇款且金额在1万以下的;
B. 办理定期储蓄账户提前支取;
C. 非首次在我行开立的储蓄账户;
D. 开立个人结算账户,开立客户号;变更存款人证件类型、证件号码
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用